Description
The EduKart Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'edukart_pro_register_user_front_end' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Published: 2025-11-25
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation to administrator role
Action: Immediate Patch
AI Analysis

Impact

The vulnerability lies in the fact that the EduKart Pro plugin for WordPress allows users to specify any role during the front‑end registration process. An unauthenticated attacker can submit the role "administrator" in a registration request and, because the 'edukart_pro_register_user_front_end' function does not check for administrative privileges, the site will create an account with full administrative rights. This gives the attacker full control of the WordPress installation, including the ability to modify content, install additional plugins, or compromise the site's data integrity and confidentiality. The weakness is a classic example of insufficient privilege management (CWE‑269).

Affected Systems

All installations of the EduKart Pro WordPress theme or plugin from the vendor VenusWeb that are running version 1.0.3 or earlier are affected. The vulnerability is not limited to a specific operating system or hosting environment; any WordPress site that has this plugin enabled and allows user registration is at risk.

Risk and Exploitability

The CVSS score of 9.8 indicates a critical severity. The EPSS score of less than 1% shows that at the time of this assessment the probability of exploitation is currently low, and the vulnerability is not yet listed in the CISA KEV catalog. However, because the exploit requires no authentication and involves only a simple form submission, a motivated attacker can easily craft a request to register with the administrator role. If the site relies on recruitment for new users, an attacker could enumerate valid endpoints, submit the payload, and gain administrative access, thereby bypassing all other access controls.

Generated by OpenCVE AI on April 21, 2026 at 01:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update EduKart Pro to the newest version that includes a role‑restriction fix.
  • If an update is unavailable, disable the "edukart_pro_register_user_front_end" endpoint or remove the plugin altogether to prevent unauthenticated role assignment.
  • Reconfigure the WordPress registration process to force the default role to "subscriber" or another lower‑privilege role, and audit existing accounts for unintended administrator roles.

Generated by OpenCVE AI on April 21, 2026 at 01:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 26 Nov 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 25 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 25 Nov 2025 05:00:00 +0000

Type Values Removed Values Added
Description The EduKart Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'edukart_pro_register_user_front_end' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Title EduKart Pro <= 1.0.3 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:38.986Z

Reserved: 2025-11-22T16:45:36.723Z

Link: CVE-2025-13559

cve-icon Vulnrichment

Updated: 2025-11-25T16:59:38.156Z

cve-icon NVD

Status : Deferred

Published: 2025-11-25T05:16:10.967

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13559

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:30:24Z

Weaknesses